How to protect your meeting from cyber threats
As he began his presentation on cyber security at meetings, Michael Robinson showed a slide to the audience. “Recognize this?” he asked. We all did. It was the landing page for logging in to the hotel’s Wi-Fi network, with fields for a guest’s last name and room number. Robinson then told us that the page was a fake, one he’d set up within 15 minutes of getting into his hotel room. And with a router the size of a deck of cards, he could have quickly set up a network with the same name as the hotel’s network, and dumped unsuspecting users over to this innocent-looking landing page. None of us would have been the wiser, but all our data would be ripe for the picking by this MitM (man-in-the-middle attack—that’s some cryptography/computer security lingo).
To read the full article, please follow this link to the website of our media member MEETINGSNET Magazines & E-Media, Penton Media.
|